Threats, Attacks, And Vulnerability Assessment.docx -...

This preview shows page 1 out of 1 page.

Threats, Attacks, And Vulnerability Assessment Throughout this course you will study the different roles that contribute to an organization's information security and assurance. Part A: Select an organization you wish to explore and use throughout the course. As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments. Part B: A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber- related interests. Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture